cvelist/2024/4xxx/CVE-2024-4255.json

110 lines
4.2 KiB
JSON
Raw Normal View History

2024-04-26 13:00:33 +00:00
{
2024-04-27 15:00:34 +00:00
"data_version": "4.0",
2024-04-26 13:00:33 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-4255",
2024-04-27 15:00:34 +00:00
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
2024-04-26 13:00:33 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-04-27 15:00:34 +00:00
"value": "A vulnerability, which was classified as critical, has been found in Ruijie RG-UAC up to 20240419. This issue affects some unknown processing of the file /view/network Config/GRE/gre_edit_commit.php. The manipulation of the argument name leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-262145 was assigned to this vulnerability."
},
{
"lang": "deu",
"value": "Eine Schwachstelle wurde in Ruijie RG-UAC bis 20240419 entdeckt. Sie wurde als kritisch eingestuft. Davon betroffen ist unbekannter Code der Datei /view/network Config/GRE/gre_edit_commit.php. Durch Manipulation des Arguments name mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-78 OS Command Injection",
"cweId": "CWE-78"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Ruijie",
"product": {
"product_data": [
{
"product_name": "RG-UAC",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "20240419"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.262145",
"refsource": "MISC",
"name": "https://vuldb.com/?id.262145"
},
{
"url": "https://vuldb.com/?ctiid.262145",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.262145"
},
{
"url": "https://vuldb.com/?submit.319820",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.319820"
},
{
"url": "https://github.com/h0e4a0r1t/g-hdkyyf7L-Z8-5v/blob/main/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-gre_edit_commit.php.pdf",
"refsource": "MISC",
"name": "https://github.com/h0e4a0r1t/g-hdkyyf7L-Z8-5v/blob/main/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-gre_edit_commit.php.pdf"
}
]
},
"credits": [
{
"lang": "en",
"value": "H0e4a0r1t (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 4.7,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 4.7,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 5.8,
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P"
2024-04-26 13:00:33 +00:00
}
]
}
}